Patents Examined by Thomas M Szymanski
  • Patent number: 7263716
    Abstract: An integrated circuit, a computer system, and a method for authorizing RMCP requests. The method includes receiving a request for a system action and initiating a timer. The method also includes generating an authorization request for the system action and evaluating a result of the authorization request for the system action if received before an expiration of the timer. The method also includes granting the request for the system action if the expiration of the timer occurs before the result of the authorization request for the system action is received.
    Type: Grant
    Filed: February 4, 2002
    Date of Patent: August 28, 2007
    Assignee: Advanced Micro Devices, Inc.
    Inventor: Dale E. Gulick
  • Patent number: 7231659
    Abstract: Apparati, methods, and computer readable media for authenticating an entity (9) in a shared hosting computer network (4) environment. A service provider computer (2) contains a plurality of entity sites (5). Connected to the service provider computer (2), a trusted third party computer (1) is adapted to provide a conglomerated authenticity certification to the service provider computer (2). Coupled to the trusted third party computer (1) is a means (10) for enabling an entity (9) to seek to convert the conglomerated authenticity certification into an individualized authenticity certification covering that entity's site (5).
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: June 12, 2007
    Assignee: Verisign, Inc.
    Inventors: Kevin Trilli, Ben Golub, Owen Cheung, Wentsung Hsiao
  • Patent number: 7227951
    Abstract: Disclosed herein are apparatuses and methods for generating pseudorandom numbers by making the existing ANSI and FIPS PRNGs forward secure and eliminating the need for re-keying them. A forward secure ANSI PRNG is created which includes an enhanced block cipher that is non-invertible even if the key becomes known and a function of the block cipher used in the existing ANSI PRNG. Additionally, the forward secure ANSI PRNG includes an enhanced next state that allows previous states to remain secret even when the key and the current state become known. A forward secure FIPS PRNG is created which includes a computation of an enhanced next state that is noninvertible.
    Type: Grant
    Filed: October 8, 2002
    Date of Patent: June 5, 2007
    Assignee: NTT DoCoMo, Inc.
    Inventors: Anand Desai, Yiqun Yin, Alejandro Hevia
  • Patent number: 7210034
    Abstract: A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service.
    Type: Grant
    Filed: January 30, 2003
    Date of Patent: April 24, 2007
    Assignee: Intel Corporation
    Inventor: Ned M. Smith
  • Patent number: 7197629
    Abstract: A method of computing overhead associated with executing instructions on an out-of-order processor which includes determining when a first instruction retires, determining when a second instruction retires, and calculating an overhead based upon subtracting when the first instruction retired from when the second instruction retired.
    Type: Grant
    Filed: November 22, 2002
    Date of Patent: March 27, 2007
    Assignee: Sun Microsystems, Inc.
    Inventor: Dominic Paulraj
  • Patent number: 7178041
    Abstract: Method, system and computer program product for implementing a trusted counter in a personal communication device. In particular, the method, system and computer program product utilizes cryptography and an external, read-write storage device that stores important state information that cannot be modified without detection. Using the present invention, the counter can be implemented in a personal even if state information is stored in an insecure storage device.
    Type: Grant
    Filed: January 16, 2002
    Date of Patent: February 13, 2007
    Assignee: Nokia Corporation
    Inventors: Nadarajah Asokan, Jan-Erik Ekberg, Lauri Paatero
  • Patent number: 7158635
    Abstract: The present invention provides embodiments for producing a user equipment identification scrambling sequence (UEIDSS). The produced sequences for different user identification codes have a high separation. A base station uses the UEIDSS to scramble a high speed shared control channel (HS-SSCH) and a user equipment (UE) uses the UEIDSS to descramble the HS-SSCH. The embodiments utilize various blocks for producing the codes. These blocks include Reed-Muller encoding, concatenation, rate matching, segmentation, convolutional encoding, tail bit discarding, zero padding, repeating, CRC calculation, quadratic residue coding, parity-check bit, shortening, puncturing and BCH encoding blocks.
    Type: Grant
    Filed: December 23, 2002
    Date of Patent: January 2, 2007
    Assignee: InterDigital Technology Corporation
    Inventors: Stephen G. Dick, Nader Bolourchi, Sung-Hyuk Shin
  • Patent number: 7146009
    Abstract: A secure electronic messaging system permits communication between registered users, with the assistance of a key server. The system requires a recipient to submit key retrieval information to a key server, and obtain decryption key information. The decryption key information is necessary for the recipient to form the decryption key which is used to read a message encrypted by the sender. The decryption key information may be an encrypted version of a decryption key, or portions thereof, or may be portions of an unencrypted version of a decryption key, among others. Typically, the key retrieval information may either be sent to the recipient by the sender, or may be generated by the recipient, based on information sent by the sender.
    Type: Grant
    Filed: February 5, 2002
    Date of Patent: December 5, 2006
    Assignee: Surety, LLC
    Inventors: Dimitrios Emmanouil Andivahis, Shawn Michael Edwards Carnell, Addison McElroy Fischer, Albert John Wettlaufer